CN111079192B - Webpage content self-protection method and server - Google Patents

Webpage content self-protection method and server Download PDF

Info

Publication number
CN111079192B
CN111079192B CN201811215563.7A CN201811215563A CN111079192B CN 111079192 B CN111079192 B CN 111079192B CN 201811215563 A CN201811215563 A CN 201811215563A CN 111079192 B CN111079192 B CN 111079192B
Authority
CN
China
Prior art keywords
web page
password
component
target
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811215563.7A
Other languages
Chinese (zh)
Other versions
CN111079192A (en
Inventor
林耕葆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Acer Inc
Original Assignee
Acer Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Acer Inc filed Critical Acer Inc
Priority to CN201811215563.7A priority Critical patent/CN111079192B/en
Publication of CN111079192A publication Critical patent/CN111079192A/en
Application granted granted Critical
Publication of CN111079192B publication Critical patent/CN111079192B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links

Abstract

The invention discloses a webpage content self-protection method and a related server, wherein the method comprises the following steps: running a set of web page components of at least one web page through a browser, wherein at least a portion of the web page components in the set of web page components include web page content thereof; monitoring a target web page component in the set of web page components to determine whether any content change event occurs with respect to the target web page component; when the content change event occurs, storing previous data of the target webpage component and generating a first password, wherein the first password is a one-time password; attempting to extract a second password from the target web page component for password verification; and when the second password is failed to be extracted or the first password is different from the second password, restoring the target webpage component according to the previous data. The invention can make the browser self-protect the webpage content by using the program module of at least one webpage.

Description

Webpage content self-protection method and server
Technical Field
The present invention relates to web page protection, and more particularly, to a method for self-protecting web page contents and a server thereof.
Background
Web content providers typically want the web content viewed by the user to be correct and not tampered with. However, the environment of the client device may vary, such as the client device is poisoned, the client device is installed with a browser plug-in, etc., which may cause the web page content viewed by the user to be different from the original web page content, the background color may be changed when the variation is smaller, and the illegal, violent, erotic, etc. content may be inserted when the variation is more serious. Thus, not only the contents provider of the web page may be misunderstood, but also the user's rights and interests may be infringed. Therefore, a novel method and related architecture are needed to improve web page protection.
Disclosure of Invention
An objective of the present invention is to disclose a method for self-protecting web contents and a related server, so as to solve the above problems.
Another objective of the present invention is to disclose a method for self-protecting web content and a related server, so as to perform self-protection of web content in an electronic device without the assistance of a web server.
At least one embodiment of the present invention discloses a method for self-protecting web contents, wherein the method for self-protecting web contents may include: running (run) a set of web page components (web nodes) of at least one web page through a browser (browser), wherein at least a portion of the web page components in the set of web page components include web page content of the at least one web page; and running a program module of the at least one webpage through the browser to perform the following steps: monitoring (monitor) a target web page component in the set of web page components to determine whether any content alteration event has occurred with respect to the target web page component; storing previous data of the target webpage component and generating a first Password when the content change event occurs, wherein the first Password is a One-Time Password (OTP); attempting to extract a second password from the target web page component for password verification, wherein the second password is expected to be equal to the first password in the case that the target web page component is not tampered; and when the second password is failed to be extracted or the first password and the second password are different from each other, restoring (recover) the target webpage component according to the previous data.
At least one embodiment of the present invention discloses a method for self-protecting web contents, wherein the method for self-protecting web contents may include: the method includes the steps of transmitting webpage program codes with webpage contents from a server to a browser in a client device for performing webpage content self-protection when the webpage contents are displayed, wherein the webpage program codes comprise a group of webpage components and a program module of at least one webpage. The self-protection of the web page content may include: executing, by the browser, the set of web page components of the at least one web page, wherein at least a portion of the set of web page components includes the web page content of the at least one web page; and running the program module of the at least one webpage through the browser to perform the following steps: monitoring a target web page component in the set of web page components to determine whether any content change event occurs with respect to the target web page component; when the content change event occurs, storing previous data of the target webpage component and generating a first password, wherein the first password is a one-time password; attempting to extract a second password from the target web page component for password verification, wherein the second password is expected to be equal to the first password in the case that the target web page component is not tampered; and when the second password is failed to be extracted or the first password and the second password are different from each other, restoring the target webpage component according to the previous data.
At least one embodiment of the present invention discloses a server, wherein the server may include: a network interface circuit for coupling the server to at least one network; and a processing circuit, coupled to the network interface circuit, for controlling the operation of the server. The processing circuit may utilize the network interface circuit to transmit a web page program code with web page content from the server to a browser in a client device through the at least one network for web page content self-protection when displaying the web page content, wherein the web page program code includes a set of web page components and a program module of at least one web page. The self-protection of the web page content may include: executing, by the browser, the set of web page components of the at least one web page, wherein at least a portion of the set of web page components includes the web page content of the at least one web page; and running the program module of the at least one webpage through the browser to perform the following steps: monitoring a target web page component in the set of web page components to determine whether any content change event occurs with respect to the target web page component; when the content change event occurs, storing previous data of the target webpage component and generating a first password, wherein the first password is a one-time password; attempting to extract a second password from the target web page component for password verification, wherein the second password is expected to be equal to the first password in the case that the target web page component is not tampered; and when the second password is failed to be extracted or the first password and the second password are different from each other, restoring the target webpage component according to the previous data.
The benefits of the invention are for example: when the browser loads the at least one web page from the server, such as a web server, according to the website address input by the user, the browser can perform self-protection of the web page contents by using the program module of the at least one web page in addition to displaying the at least one web page. In particular, the method for self-protecting web contents and the related electronic device can self-protect web contents in the electronic device without the assistance of a web server.
Drawings
Fig. 1 is a schematic diagram of an electronic device according to an embodiment of the invention.
Fig. 2 is a control scheme of a web content self-protection method according to an embodiment of the invention.
Fig. 3 shows a workflow of the method for self-protecting web page content in an embodiment.
Fig. 4 is a schematic diagram of a server according to an embodiment of the invention.
Wherein the reference numerals are as follows:
11,12, … webpage components
100 electronic device
100B,400B bus
110,410 processing circuit
110M,200,410M program module
120,420 random access memory
120R,140R memory region
130,430 network interface circuit
140,440 memory device
210 target web page component change monitoring unit
220 fluctuation checking and controlling unit
220R previous data cache unit
222 one-time password authentication unit
224 one-time password extraction unit
230 one-time password generation unit
240 clock unit
250 time interval calculation unit
260 recovery unit
300 work flow
S31,S32,S33,S34,S35,
S36, S37, S38, S39
400 server
Detailed Description
Fig. 1 is a schematic diagram of an electronic device 100 according to an embodiment of the invention. The electronic device 100 may include a processing circuit 110, a Random Access Memory (RAM) 120, a network interface circuit 130, and a storage device 140, wherein the components (e.g., the processing circuit 110, the RAM 120, the network interface circuit 130, and the storage device 140) may be coupled to each other via a bus 100B. In some embodiments, the architecture shown in FIG. 1 may be varied, and one or more elements may be added, deleted or modified. In the above embodiments, the electronic device 100 can be implemented by using a multifunctional mobile phone, a tablet computer, a desktop personal computer, a laptop personal computer, and the like. The processing circuit 110 may be implemented in the form of one or more processors. The storage device 140 may be implemented by a Hard Disk Drive (Hard Disk Drive) or a Non-volatile memory (Non-volatile memory) module, for example: non-volatile memories such as flash memory modules and Solid State drives (Solid State drives).
According to the present embodiment, the processing circuit 110 can execute at least one program module (e.g., one or more program modules), which can be generally referred to as program module 110M. Examples of program modules 110M may include (but are not limited to): an Operating System (OS), a browser, and web page program code that runs through the browser. The processing circuit 110 may execute the program module 110M to control the operation of the electronic device 100. In addition, the ram 120 and the storage device 140 (e.g., the respective storage areas 120R and 140R thereof) may store information, and the network interface circuit 130 may be used to couple the electronic device 100 to at least one network (e.g., one or more networks such as a wired network and/or a wireless network) to provide network services to the electronic device 100. For example, when the browser loads the web page program code from a web page server according to the website address input by the user, the web page program code may carry a web page content self-protection program module implemented according to the web page content self-protection method of the present invention. In addition to displaying the web page, the browser can use the web page content self-protection program module to perform the self-protection of the web page content.
Fig. 2 is a control scheme of the method for self-protecting web contents according to an embodiment of the invention, wherein a program module 200 may be taken as an example of the web contents self-protecting program module. The web page program code may include a set of web page components (web nodes) {11,12, … } and program modules 200 of at least one web page, and may be run on the electronic device 100 (e.g., the processing circuit 110) through the browser. The program module 200 may include a target web component change monitoring unit 210, a change checking and controlling unit 220, a one-time password verifying unit (OTP verification unit)222, a one-time password extracting unit (OTP extraction unit)224, a one-time password generating unit (OTP generation unit)230, a clock unit 240, a time interval calculating unit 250, and a recovering unit 260, and may write or read information in a previous data caching unit 220R, where the previous data caching unit 220R may be disposed in the storage area 120R. In some embodiments, the previous data cache unit 220R may be disposed in the storage area 140R.
According to this embodiment, the target netpage element change monitor unit 210 may monitor one or more netpage elements of the set of netpage elements {11,12, … }, and in particular, monitor a target netpage element, such as any of the netpage elements of the set of netpage elements {11,12, … }, and upon detecting any change in the target netpage element, call the change checking and control unit 220, and provide or transmit both previous data (such as pre-change data) and latest data (such as post-change data) of the target netpage element to the change checking and control unit 220. The change checking and controlling unit 220 may store the previous data in the previous data caching unit 220R for the restoring unit 260 to read when needed, wherein the restoring unit 260 may replace the latest data with the previous data to restore the target web page component. In addition, the change checking and controlling unit 220 may perform related checking and controlling on the change, for example, perform one-time password authentication and one-time password extraction using the one-time password authenticating unit 222 and the one-time password extracting unit 224, respectively. The change checking and controlling unit 220 may call the one-time-password generating unit 230 to obtain the one-time-password generated and returned (return) by the one-time-password generating unit 230. To generate the one-time password, the one-time password generating unit 230 calls the clock unit 240 and the time interval calculating unit 250 to obtain a current time value (e.g., UNIX time used by UNIX or a UNIX-like system, such as the total number of seconds from 0/1/1970 to the time of calling the clock unit 240 calculated by universal coordinated time (UTC)) returned by the clock unit 240 and a time interval returned by the time interval calculating unit 250. The one-time password generating unit 230 subtracts an initial time value from the current time value to generate a time difference value, divides the time difference value by the time interval by integer division to generate an integer division result, and generates the one-time password according to the integer division result. For example, the one-time password generation unit 230 may bring the result of the integer division operation into a predetermined function to generate the one-time password. For another example, the One-Time Password generating unit 230 may generate the One-Time Password according to the integer division operation result by using a Time-based One-Time Password (TOTP) algorithm. Furthermore, the time interval may be equal to a predetermined value (e.g., 30 seconds, or any other length of time). In some embodiments, the program module 200 (e.g., the change checking and control unit 220, the one-time password generation unit 230, and/or the time interval calculation unit 250) may adjust the time interval as needed.
For ease of understanding, it is assumed that the change is caused by another program module carried by the web page program code, and that the other program module and program module 200 may be provided by the web page provider (or its associated personnel) of the at least one web page. In this case, the other program module may generate the same one-time password in advance based on the same one-time password generation method and embed the same one-time password in the target webpage component for the one-time password extraction unit 224 to extract and for the one-time password verification unit 222 to verify. Since the password verification is successful, the change checking and control unit 220 allows the change and clears the previous data in the previous data cache unit 220R. On the other hand, it is assumed that the change is caused by malware. In this case, the correct password embedded in the target web page component (such as the same one-time password described above) may have become an error message or be lost. For example, when the correct password becomes an error message, the one-time password verification unit 222 can perform one-time password verification according to the error message extracted by the one-time password extraction unit 224, but the verification fails. For another example, when the correct password is lost, the otp extraction unit 224 can perform otp extraction, but the extraction fails. Whether verification failure or extraction failure occurs, the change checking and control unit 220 may call the recovery unit 260 to replace the latest data with the previous data to recover the target web page component, wherein the recovery unit 260 may return the operation result thereof, and in particular, return a completion message to the change checking and control unit 220 after completing the recovery operation to inform the completion of the recovery operation.
Based on the control scheme shown in fig. 2, the browser running on the electronic device 100 may load the at least one web page from the web server through the at least one network to display the at least one web page and perform self-protection of the web page content by using the program module 200. The web content self-protection is performed entirely in the electronic device 100 and does not require the assistance of the web server. Therefore, the self-protection method for web page contents of the present invention can ensure excellent performance and high security.
Fig. 3 shows a workflow 300 of the method for web content self-protection in an embodiment. According to this embodiment, the processing circuit 110 may execute the set of web page components {11,12, … } of the at least one web page through the browser, and may execute the program module 200 through the browser to perform an operation related to self-protection of web page content, such as an operation in the workflow 300, wherein at least a portion of the web page components (e.g., a portion or all of the set of web page components {11,12, … } of the set of web page components {11,12, … } may include web page content of the at least one web page. The workflow 300 may be illustrated as follows.
In step S31, the target web component change monitoring unit 210 may monitor the target web component in the set of web components {11,12, … } to determine whether any content change event (e.g., the changed event) occurs with respect to the target web component.
In step S32, the target web page element change monitoring unit 210 may check whether the content change event occurs. When the content change event occurs, the process proceeds to step S33; otherwise, go to step S31 to continue monitoring the target web page component.
In step S33, the change checking and controlling unit 220 may store the previous data of the target web page element and generate a first password, such as the one-time password, by using the one-time password generating unit 230. For example, the change checking and controlling unit 220 may temporarily store the previous data in the previous data buffering unit 220R, and call the one-time password generating unit 230 to generate the first password.
In step S34, the change checking and controlling unit 220 may attempt to extract a second password from the target web page component for password verification by using the one-time password extracting unit 224. For example, in the case where the target web page component is not tampered, the second password (such as the same one-time password described above) is expected to be equal to the first password.
In step S35, the change checking and control unit 220 may check whether the operation of extracting the second password is successful. When the second password is successfully extracted (e.g., the one-time password extracting unit 224 obtains the second password), the process proceeds to step S36; otherwise (e.g., the one-time password extracting unit 224 generates an error message indicating that the second password is not extracted), the process proceeds to step S38.
In step S36, the change checking and control unit 220 may perform password verification by comparing the generated password (such as the first password in step S33) with the extracted password (such as the second password in step S34) using the one-time password verification unit 222. According to the present embodiment, the one-time password verification unit 222 may compare the first password and the second password to generate a comparison result, which indicates whether the first password and the second password are the same or different. For example, the other program module entrained by the web page program code may pre-control the target web page component to entrain the second password (such as the same one-time password described above) for password verification. In this case, the comparison result may indicate that the first password and the second password are identical to each other.
In step S37, the change checking and control unit 220 may check whether the password authentication fails. When the password authentication fails (for example, the comparison result indicates that the first password and the second password are different from each other), the step S38 is entered; otherwise (e.g., the comparison result indicates that the first password and the second password are identical to each other), the process proceeds to step S39.
In step S38, the alteration check and control unit 220 may restore the target web page element according to the previous data by using the restoring unit 260. According to this embodiment, when the second password fails to be extracted or the first password and the second password are different from each other, the restoring unit 260 may restore the target web page component according to the previous data, and in particular, replace the latest data (such as post-change data) with the previous data (such as pre-change data).
In step S39, the change checking and control unit 220 may remove the previous data stored in step S33. For example, the change check and control unit 220 may remove the previous data from the previous data cache unit 220R.
For a better understanding, the method may be illustrated with the workflow 300 shown in FIG. 3. According to some embodiments, one or more steps may be added, deleted, or modified in the workflow 300.
According to this embodiment, when the set of web page components {11,12, … } is loaded, the browser also loads the program module 200 built (embedded in) the at least one web page for performing the workflow 300 (e.g., the steps { S31, S32, …, S39} therein, which are related to various conditions). For example, when the change is caused by the other program module, the related steps corresponding to the condition, such as the steps { S31, S32, S33, S34, S35, S36, S37, S39} may be sequentially performed. For another example, when the change is caused by the malware, the steps corresponding to the condition, such as steps { S31, S32, S33, S34, S35, S38} or steps { S31, S32, S33, S34, S35, S36, S37, S38} may be performed sequentially. Additionally, the set of web page components {11,12, … } may conform to a Document Object Model (DOM) standard.
Details of the implementation of the target web component change monitoring unit 210 are described below. According to some embodiments, the program module 200 may call the browser through a predetermined Application Programming Interface (API) to create an Instance (Instance) of a viewer/Listener (Listener), temporarily store the Instance in the ram 120, and return a Reference (Reference) to the Instance. Then, the program module 200 may perform operations such as setting the instance by the reference for monitoring the target web page component. For ease of understanding, the predetermined application program interface may be a variant Observer application program interface (Mutation Observer API), for example, program module 200 may perform the relevant control by:
var obs=new MutationObserver();
obs.observe(target,config);
where the MutationObserver () may create the instance and return its reference, a target in observe may represent a reference of a component to be observed (such as the target web component), and an oberve in observe may inform the instance of what type of change (e.g., add, remove) that this component is expected to be observed (such as the target web component). For example, the predetermined application program interface may be other application program interfaces as long as the implementation of the present invention is not hindered. In some embodiments, the target web component change monitoring unit 210 may operate the instance of the viewer to monitor the target web component. In some embodiments, the program module 200 may utilize the instance of the viewer as the target web component change monitoring unit 210 to monitor the target web component.
According to some embodiments, the target web page component may entrain the second password by an attribute. For example, program code for an attribute "img tag"/> "may carry data with a tag (tag) of" applet ", while the target web page component may carry the second password in a similar manner.
According to some embodiments, the target web page component may carry the second password, as follows:
Changes.addedNodes=[{
Node:<div name=“sample”data-pwd=“235300”/>,
}]
235300 may be used as an example of the second password (such as the same one-time password described above).
TABLE 1
Table 1 shows examples of the previous data (such as pre-change data) and the latest data (such as post-change data). Assuming that the change is caused by malware, the one-time password extraction unit 224 may extract the second password such as 002353. In step S36, the change checking and controlling unit 220 may compare the first password (e.g., 235300) and the second password (e.g., 002353) by using the one-time password verification unit 222 for password verification. Password authentication fails because the comparison result may indicate that the first password (e.g., 235300) and the second password (e.g., 002353) are different from each other. In step S38, the change checking and controlling unit 220 may restore the target web page component according to the previous data (e.g., Null) by using the restoring unit 260.
Fig. 4 is a diagram illustrating a server 400 according to an embodiment of the invention. The server 400 may include a processing circuit 410, a random access memory 420, a network interface circuit 430, and a storage device 440, wherein the components (e.g., the processing circuit 410, the random access memory 420, the network interface circuit 430, and the storage device 440) may be coupled to each other via a bus 400B. In some embodiments, the architecture shown in FIG. 4 may be varied, and one or more elements may be added, deleted or modified. In the above embodiments, the processing circuit 410 may be implemented by one or more processors, and the storage device 440 may be implemented by a hard disk drive or a solid state drive.
According to the embodiment, the processing circuit 410M may execute the program module 410M to control the operation of the server 400, and the program module 410M may include an operating system, a database management program, a web page management program, and the like. In addition, the ram 420 and the storage device 440 can store information, and the network interface circuit 430 can be used to couple the server 400 to at least one network. For example, the web page program code may be stored in advance in the storage device 440 or another server. The processing circuit 410 can read the pre-stored webpage program code and temporarily store the webpage program code in the random access memory 420 to provide webpage service to any one of a plurality of client devices, such as the electronic device 100. The processing circuit 410 may utilize the network interface circuit 430 to transmit the netpage program code with the netpage content from the server 400 to a browser in the client device via the at least one network for performing a netpage content self-protection when displaying the netpage content, wherein the netpage content self-protection may include: running the set of web page components {11,12, … } of the at least one web page through the browser; and running the program module 200 of the at least one web page through the browser to perform operations related to self-protection of the content of the web page, such as the operations in the workflow 300.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for self-protecting webpage content is characterized by comprising the following steps:
running a set of web page components of at least one web page through a browser, wherein at least a portion of the web page components in the set of web page components include web page content of the at least one web page; and
operating a program module of the at least one webpage through the browser to perform the following steps:
monitoring a target web page component in the set of web page components to determine whether any content change event occurs with respect to the target web page component;
when the content change event occurs, storing previous data of the target webpage component and generating a first password, wherein the first password is a one-time password;
attempting to extract a second password from the target web page component for password verification, wherein the second password is expected to be equal to the first password in the case that the target web page component is not tampered; and
when the second password is failed to be extracted or the first password and the second password are different from each other, restoring the target webpage component according to the previous data.
2. The method for web content self-protection as claimed in claim 1, wherein when the set of web components is loaded, the browser also loads the program module built into the at least one web page for performing the steps of monitoring the target web component, storing the previous data and generating the first password, attempting to extract the second password from the target web component, and restoring the target web component.
3. The web content self-protection method according to claim 1, further comprising:
monitoring the target web component by a target web component change monitoring unit, wherein the target web component change monitoring unit provides the previous data of the target web component when the content change event occurs.
4. The web content self-protection method according to claim 1, further comprising:
and pre-controlling the target webpage component to carry the second password for password verification.
5. The web content self-protection method of claim 1, wherein generating the first password comprises:
subtracting an initial time value from a current time value to generate a time difference value;
dividing the time difference value by a time interval in an integer division mode to generate an integer division operation result; and
and generating the first password according to the integer division operation result.
6. The web content self-protection method according to claim 5, further comprising:
and substituting the integer division operation result into a preset function to generate the first password.
7. The web content self-protection method according to claim 5, further comprising:
and generating the first password according to the integer division operation result based on a time one-time password algorithm.
8. A method for self-protecting webpage content is characterized by comprising the following steps:
transmitting a web page program code with web page contents from a server to a browser in a client device for web page content self-protection when displaying the web page contents, wherein the web page program code comprises a set of web page components and a program module of at least one web page;
wherein the webpage content self-protection comprises:
executing, by the browser, the set of web page components of the at least one web page, wherein at least a portion of the set of web page components includes the web page content of the at least one web page; and
operating the program module of the at least one webpage through the browser to perform the following steps:
monitoring a target web page component in the set of web page components to determine whether any content change event occurs with respect to the target web page component;
when the content change event occurs, storing previous data of the target webpage component and generating a first password, wherein the first password is a one-time password;
attempting to extract a second password from the target web page component for password verification, wherein the second password is expected to be equal to the first password in the case that the target web page component is not tampered; and
when the second password is failed to be extracted or the first password and the second password are different from each other, restoring the target webpage component according to the previous data.
9. The method for web content self-protection as claimed in claim 8, wherein when the set of web components is loaded, the browser also loads the program module built into the at least one web page for performing the steps of monitoring the target web component, storing the previous data and generating the first password, attempting to extract the second password from the target web component, and restoring the target web component.
10. A server, comprising:
a network interface circuit for coupling the server to at least one network; and
a processing circuit, coupled to the network interface circuit, for controlling the operation of the server, wherein the processing circuit uses the network interface circuit to transmit a web page program code with web page contents from the server to a browser in a client device through the at least one network for web page content self-protection when displaying the web page contents, wherein the web page program code includes a set of web page components and a program module of at least one web page;
wherein the webpage content self-protection comprises:
executing, by the browser, the set of web page components of the at least one web page, wherein at least a portion of the set of web page components includes the web page content of the at least one web page; and
operating the program module of the at least one webpage through the browser to perform the following steps:
monitoring a target web page component in the set of web page components to determine whether any content change event occurs with respect to the target web page component;
when the content change event occurs, storing previous data of the target webpage component and generating a first password, wherein the first password is a one-time password;
attempting to extract a second password from the target web page component for password verification, wherein the second password is expected to be equal to the first password in the case that the target web page component is not tampered; and
when the second password is failed to be extracted or the first password and the second password are different from each other, restoring the target webpage component according to the previous data.
CN201811215563.7A 2018-10-18 2018-10-18 Webpage content self-protection method and server Active CN111079192B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811215563.7A CN111079192B (en) 2018-10-18 2018-10-18 Webpage content self-protection method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811215563.7A CN111079192B (en) 2018-10-18 2018-10-18 Webpage content self-protection method and server

Publications (2)

Publication Number Publication Date
CN111079192A CN111079192A (en) 2020-04-28
CN111079192B true CN111079192B (en) 2022-03-01

Family

ID=70308830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811215563.7A Active CN111079192B (en) 2018-10-18 2018-10-18 Webpage content self-protection method and server

Country Status (1)

Country Link
CN (1) CN111079192B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101251855B (en) * 2008-03-27 2010-12-22 腾讯科技(深圳)有限公司 Equipment, system and method for cleaning internet web page
CN101782919B (en) * 2009-12-29 2017-02-01 北京搜狗科技发展有限公司 Web form data output method, device and form processing system
CN101847153B (en) * 2010-01-27 2012-08-22 深圳市龙视传媒有限公司 Dynamic data processing method and device
TWI669624B (en) * 2018-09-19 2019-08-21 宏碁股份有限公司 Webpage content self-protection method and associated server

Also Published As

Publication number Publication date
CN111079192A (en) 2020-04-28

Similar Documents

Publication Publication Date Title
US10162951B2 (en) Non-intrusive background synchronization when authentication is required
TWI669624B (en) Webpage content self-protection method and associated server
CN101276389B (en) Separation of logical trusted platform modules within a single physical trusted platform module
CN105446713A (en) Safe storage method and equipment
US11146553B2 (en) Systems and methods for online fraud detection
CN109325349A (en) A kind of method for managing security, terminal device and computer readable storage medium
CN105550071A (en) System file upgrading and detecting method and communication device
CN108763888B (en) User profile processing method and device, computer equipment and storage medium
CN111079192B (en) Webpage content self-protection method and server
CN111698227B (en) Information synchronization management method, device, computer system and readable storage medium
CN112231232A (en) Method, device and equipment for determining test data model and generating test data
EP3980955A1 (en) Subscription to edits of blockchain transaction
WO2019144555A1 (en) Disaster recovery data online synchronization device and method, and computer readable storage medium
US11115804B2 (en) Subscription to dependencies in smart contracts
CN108133149B (en) Data protection method and device and electronic equipment
CN108228219B (en) Method and device for verifying BIOS validity during in-band refreshing of BIOS
US20210081569A1 (en) Puf-based data integrity
CN113360172A (en) Application deployment method and device, computer equipment and storage medium
CN113722225A (en) Page testing method and device, computer equipment and storage medium
CN110704218A (en) Data processing method, data processing device, computer equipment and storage medium
CN114143308A (en) File uploading information processing method and device, computer equipment and storage medium
CN112732363A (en) H5 page opening method and device and electronic equipment
CN111273952A (en) Trusted recovery updating method and device
CN112860564A (en) Code detection method, server, user terminal, computer device and storage medium
CN111680334A (en) Disk security access method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant